Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing.

Slides:



Advertisements
Similar presentations
1 Computer Engineering Department Islamic University of Gaza ECOM 5347 Network Security Undergraduate Course Fall Prof. Mohammad A. Mikki Room.
Advertisements

Accountability in Hosted Virtual Networks Eric Keller, Ruby B. Lee, Jennifer Rexford Princeton University VISA 2009.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Introduction and Logistics Amir Houmansadr CS660: Advanced Information Assurance Spring 2015.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci599 Trusted Computing Lecture notes.
Statistical Methods in Computer Science Course Introduction Ido Dagan.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
PSY Evolutionary Psychology Instructor: Danny Krupp.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
CSCD 330 Network Programming Winter 2012 Lecture 1 - Course Details.
Welcome to CS 395/495 Measurement and Analysis of Online Social Networks.
EECS 395/495 Algorithmic Techniques for Bioinformatics General Introduction 9/27/2012 Ming-Yang Kao 19/27/2012.
ECE 751: Embedded Computing Systems Prof. Mikko Lipasti Lecture notes adapted from Prof. Mike Schulte Course Overview.
ELEC516/10 course_des 1 ELEC516 VLSI System Design and Design Automation Spring 2010 Course Description Chi-ying Tsui Department of Electrical and Electronic.
Fall 2010 Instructor: Emily Batty.  Emily Batty   is the BEST way to reach me!!!
ECE 284: Special Topics in Computer Engineering On-Chip Interconnection Networks Prof. Bill Lin Spring 2014.
BIT 115: Introduction To Programming1 Sit in front of a computer Log in –Username: 230class –password: –domain: student Bring up the course web.
1 CDA6938 Special Topic: Research in Computer and Network Security (spring’07) Class Overview.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
Lecture 1 Page 1 CS 239, Fall 2010 Introduction CS 239 Advanced Topics in Computer Security Peter Reiher September 23, 2010.
1 Introduction to Operating Systems 9/16/2008 Lecture #1.
James Tam CPSC 203: Introduction To Computers (Independent Study) James Tam.
@Yuan Xue CS 285 Network Security Fall 2008.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
ECE 353 Introduction to Microprocessor Systems Michael J. Schulte Week 1.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
CIS 4930/6930: Systems Security Instructor: Xinming “Simon” Ou TA: Xiaolong “Daniel” Wang Class time: MW 2-3:15 1.
CSCE 496/896 Self-Managing Computer Systems Ying Lu 106 Schorr Center
1 CAP6133: Advanced Topics in Computer Security and Computer Forensics (spring’08) Class Overview Dr. Cliff Zou.
Welcome to EECS 395/495 Networking Problems in Cloud Computing.
Introduction Fall 2001 Foundations of Computer Systems Prerequisite:91.166* or * Section A Instructor: Dr. David Hutchinson Office:
CS Welcome to CS 5383, Topics in Software Assurance, Toward Zero-defect Programming Spring 2007.
 Course Overview Distributed Systems IT332. Course Description  The course introduces the main principles underlying distributed systems: processes,
Scholarship Skills Andrew Black 1 Lecture 1 Scholarship Skills Andrew P Black Winter 2013 All material © 1996–2012 David Maier, Tim Sheard, Andrew Black,
The Endgame These FAQs will be posted and updated as new information comes in. This is as of 12/2/2013. This is all subject to revision. Here are some.
Network Economics -- Introduction and rules Patrick Loiseau EURECOM Fall 2012.
CDA 4253 FPGA System Design Hao Zheng Dept of Comp Sci & Eng USF.
Advanced Topics in Computer Networks (Fall 2005) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
Sensor Networks (Spring 2004) Instructor: Instructor:Dr. Damla Turgut Office: Office:450 ENGR 1 Bldg Office Phone: Office Phone:(407)
James Tam Introduction To CPSC 233 James Tam Java Object-Orientation Graphical-user interfaces.
Lecture 1 Page 1 CS 236 Online Introduction CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
1 NES554: Computer Networks Defense Course Overview.
Mgt 540 Intro 1 Mgt 540 Research Methods. Mgt 540 Intro 2 Introduction Emeric Solymossy –Pronounced “Shoi-moshi” “Dr. E ” Availability / Accessibility.
CSCE 990 Advanced Distributed Systems Seminar Ying Lu 104 Schorr Center
CSE Wireless and Adhoc networks Instructor: Ayman Alharbi Computer Engineering Dept. (Head of dept. ) Why ?
KAIST CS710 Topics in Computational Architecture Wireless Networks and Security : Issues, Challenges and Research Trends Syllabus Network &
Course Overview Stephen M. Thebaut, Ph.D. University of Florida Software Engineering.
CIS 4930/6930: Systems Security
Welcome to EECS 395/495 Networking Problems in Cloud Computing
Software Engineering (1)
CDA6938/COT4932 Special Topic: Research in Computer and Network Security (spring’06) Class Overview.
CIS 4930/6930: Systems Security
CNT 4704 Computer Communication Networking (not “analysis”)
Purpose of Class To prepare students for research and advanced work in security topics To familiarize students working in other networking areas with important.
Computational Science - Computer Science
Dr. Clincy Professor of CS
CPSC 441: Computer Communications
ECE 751: Embedded Computing Systems Prof
CS 6020 Advanced Computer Architecture
CS 6021 Advanced Computer Architecture
Instructor: Zonghua Gu
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Introduction to the course
ISA 562 Information Security Theory and Practice
COMS 161 Introduction to Computing
CS510 Concurrent Systems Jonathan Walpole.
BIT 115: Introduction To Programming
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Lecture 1 Class Overview
Presentation transcript:

Lecture 1: Introduction Fred Chong CS290N Architectural Support for Secure and Reliable Computing

Description This course will examine architectural designs and mechanisms that enhance the security and reliability of computing systems. The course will initially cover the basic properties and building blocks of secure and reliable systems from an architect's perspective. Then we will survey the state of the art. Students will pursue an in-depth class research project relating to the topics covered.

Logistics Time: TR 9-10:50 Room: Phelps 2510 Instructor: Prof. Fred Chong; office hours by appointment; Eng I 5163 Textbook: Security Basics for Computer Architects, by Ruby B. Lee. (should be free from a UCSB machine) Prof. Fred ChongSecurity Basics for Computer Architects No class: 5/20,22

Deadlines Project Proposal due 4/15 Project Drafts due 5/20 Project final papers due 6/6

Grading Problem Sets 15% Discussion Topic 25% Project Proposals and Drafts 20% Project Final Report 40%

Problem Sets For each assigned paper, write up the following and me a copy before class: – A summary of the main points of the paper. – A critique of any shortcomings of the paper. – Any ideas on how one would extend the ideas in the paper or address its shortcomings.

Leading Discussion Assign a paper for the class to read, one week before your discussion day. Present the paper and supplemental material on your assigned day. Lead discussion, with my help, on the subject.

Project Paper The project has two goals: – A critique of 3-5 related research papers. This is not a book report. Do not just summarize what is in the papers. Point out shortcomings and possible areas for extension. – Extension of the area. Address shortcomings or extend the work in the papers. Come up with some ideas and test them with a short project. This can be in the form of some simple analysis, simulations, algorithms, or models. Remember to pick something that will fit in a quarter. Example project paper: –

Textbook: Security Basics for Computer Architects, by Ruby B. Lee. (should be free from a UCSB machine)Security Basics for Computer Architects Synthesis Lecture – Short, geared towards researchers

Security Properties Reliability is related to Security Sometimes termed together as “Trustworthy Systems”

Access Control

Forensic Properties

Individual Properties

Trustworthy vs Trusted Secure Computer System – Ideally provides Integrity, Confidentiality, Availability Trustworthy Computer – Designed to be dependable and provide security properties Trusted Computer – Security depends upon this machine and all bets are off if it is compromised Trusted Computing Base – All hw and sw that must be trusted – No commodity systems form a dependable trusted computing base – TCM (Trusted Computing Module) – a piece that can be trusted

Attacks by Property

Attacks by Modality

Remote vs Physical Access Remote Intrusion Physical Access – Software attacks – Passive electro-magnetic, thermal observation – Physical tampering Memory bus probes Exposing the chip die

Security Architecture Design Methodology

“Lee’s Mantra”

Reading Ch 1 and 2 of Lee’s book

Example: Minos and DACODA Defense against remote intrusions Control-flow hijacking – Buffer-overflow attacks Signature-based defenses Zero-Day Attacks